Skip to main content

Trust Models

  • Chapter
  • First Online:
  • 2113 Accesses

Abstract

Public key cryptography can only be used in practice if users trust the authenticity of public keys. In this chapter we explain models and infrastructures that allow us to establish trust in the authenticity of public keys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CAcert – root keys, http://www.cacert.org/index.php?id=3

  2. J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007

    Google Scholar 

  3. EBCA – TeleTrusT European Bridge CA, https://www.ebca.de/en/

  4. GNU Privacy Guard, http://www.gnupg.org/

  5. J. Jonczy, M. Wüthrich, R. Haenni, A probabilistic trust model for GnuPG, in Proceedings of the 23rd Chaos Communication Congress, 23C3, Berlin, pp. 61–66, 2006

    Google Scholar 

  6. The European Telecommunications Standards Institute (ETSI), Electronic signatures and infrastructures (ESI); Provision of harmonized trust-service status information. ETSI TS 102 231 V3.1.2, Dec 2009

    Google Scholar 

  7. The International PGP Home Page, http://www.pgpi.org/

  8. T. Ylonen, C. Lonvick, The secure shell (SSH) protocol architecture, in IETF Request for Comments, 4251, Jan 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Trust Models. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics